A Comparative Analysis of Steganographic Data Hiding within Digital Images

A huge deployment of effective steganography by several techniques with varying degrees of payload, peak signal to noise ratio (PSNR), robustness, perceptual transparency and so on has been evidenced. Steganography has been effective as an alternative to cryptography and has been projected to the forefront of digital security by the explosive growth in computational power, security awareness and through widespread intellectual pursuit. The current techniques for Steganography reviewed include substitution method such as least significant bit (LSB) and transform domain methods such as discrete cosine transform (DCT) and discrete wavelet transform (DWT). In this paper, the techniques involved with LSB, DCT and DWT are analyzed with the proper use of the performance metrics and then the techniques have been modeled by computer simulations. The results from simulation indicate that the LSB technique, although easy to implement and encode and having good payload capacity, is easily prone to statistical attack, since the histogram plots are revealing the data hidden within. On the other hand, transform domain techniques are more robust to statistical attacks but at the cost of reduced payload.

[1]  Nasir D. Memon,et al.  Performance study of common image steganography and steganalysis techniques , 2006, J. Electronic Imaging.

[2]  K. R. Venugopal,et al.  Genetic Algorithm Based Steganography Using Wavelets , 2007, ICISS.

[3]  Fazida Othman,et al.  Stego-Image vs Stego-Analysis System , 2009 .

[4]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[5]  Yao Zhao,et al.  Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm , 2010, EURASIP J. Adv. Signal Process..

[6]  Fawzi M. Al-Naima,et al.  A modified high capacity image steganography technique based on wavelet transform , 2010, Int. Arab J. Inf. Technol..

[7]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[8]  Aman Jantan,et al.  A New Steganography Approach for Image Encryption Exchange by Using the Least Significant Bit Insertion , 2008 .

[9]  Sushil Jajodia,et al.  Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).

[10]  Weblog Wikipedia,et al.  In Wikipedia the Free Encyclopedia , 2005 .

[11]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[12]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[13]  Frank Y. Shih,et al.  Digital Watermarking and Steganography: Fundamentals and Techniques , 2007 .

[14]  Rafael C. González,et al.  Digital image processing using MATLAB , 2006 .

[15]  Lisa M. Marvel,et al.  Hiding information in images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[16]  Hany Farid,et al.  Detecting Steganographic Messages in Digital Images , 2001 .

[17]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998 .

[18]  R. Akila,et al.  A Comparative Analysis of Image Steganography , 2010 .

[19]  Sushil Jajodia,et al.  Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.